Unified system for authentication and authorization
First Claim
Patent Images
1. A method of performing an authorization for access to a service offered by a trusted application comprising:
- receiving, by an authorization framework executed by a processing device, a request from the trusted application to authorize a client application that requests the service offered by the trusted application, wherein the request identifies the client application and an action to be carried out by the trusted application;
determining, in view of the request, whether the client application is authorized to access the trusted application in view of an authorization policy;
causing an authentication of a user of the client application in response to determining the client application is authorized to access the trusted application; and
returning, by the authorization framework and to the trusted application, an authorization result in view of the determining and the authentication that indicates to the trusted application whether to offer the client application the service and whether to carry out the action.
1 Assignment
0 Petitions
Accused Products
Abstract
A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. In view of the request, it is determined whether the client application is authorized to access the trusted application in view of an authorization policy. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication.
48 Citations
20 Claims
-
1. A method of performing an authorization for access to a service offered by a trusted application comprising:
-
receiving, by an authorization framework executed by a processing device, a request from the trusted application to authorize a client application that requests the service offered by the trusted application, wherein the request identifies the client application and an action to be carried out by the trusted application; determining, in view of the request, whether the client application is authorized to access the trusted application in view of an authorization policy; causing an authentication of a user of the client application in response to determining the client application is authorized to access the trusted application; and returning, by the authorization framework and to the trusted application, an authorization result in view of the determining and the authentication that indicates to the trusted application whether to offer the client application the service and whether to carry out the action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium comprising instructions that, responsive to execution by a processing device, cause the processing device to perform operations comprising:
-
receiving, by an authorization framework executed by the processing device, a request from a trusted application to authorize a client application that requests a service offered by the trusted application, wherein the request identifies the client application and an action to be carried out by the trusted application; determining, in view of the request, whether the client application is authorized to access the trusted application in view of an authorization policy; causing an authentication of a user of the client application in response to determining the client application is authorized to access the trusted application; and returning, by the authorization framework and to the trusted application an authorization result in view of the determining and the authentication that indicates to the trusted application whether to offer the client application the service and whether to carry out the action. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system to perform an authorization for access to a service offered by a trusted application comprising:
-
a memory; and a processing device, operatively coupled to the memory, to; receive, by an authorization framework executed by the processing device, a request from the trusted application to authorize a client application that requests the service offered by the trusted application, wherein the request identifies the client application and an action to be carried out by the trusted application; determine, in view of the request, whether the client application is authorized to access the trusted application in view of an authorization policy; cause an authentication of a user of the client application in response to determining the client application is authorized to access the trusted application; and return, by the authorization framework and to the trusted application, an authorization result in view of the determining and the authentication that indicates to the trusted application whether to offer the client application the service and whether to carry out the action. - View Dependent Claims (18, 19, 20)
-
Specification